organization

Results 1 - 25 of 7477Sort Results By: Published Date | Title | Company Name
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Imagine if you could see deep into the future. And way back into the past, both at the same time. Imagine having visibility of everything that had ever happened and everything that was ever going to happen, everywhere, all at once. And then imagine processing power strong enough to make sense of all this data in every language and in every dimension. Unless you’ve achieved that digital data nirvana (and you haven’t told the rest of us), you’re going to have some unknowns in your world. In the world of security, unknown threats exist outside the enterprise in the form of malicious actors, state-sponsored attacks and malware that moves fast and destroys everything it touches. The unknown exists inside the enterprise in the form of insider threat from rogue employees or careless contractors – which was deemed by 24% of our survey respondents to pose the most serious risk to their organizations. The unknown exists in the form of new devices, new cloud applications, and new data. The unk
Tags : 
    
Cisco EMEA
Published By: Cisco EMEA     Published Date: Mar 26, 2019
Most organizations have invested, and continue to invest, in people, processes, technology, and policies to meet customer privacy requirements and avoid significant fines and other penalties. In addition, data breaches continue to expose the personal information of millions of people, and organizations are concerned about the products they buy, services they use, people they employ, and with whom they partner and do business with generally. As a result, customers are asking more questions during the buying cycle about how their data is captured, used, transferred, shared, stored, and destroyed. In last year’s study (Cisco 2018 Privacy Maturity Benchmark Study), Cisco introduced data and insights regarding how these privacy concerns were negatively impacting the buying cycle and timelines. This year’s research updates those findings and explores the benefits associated with privacy investment. Cisco’s Data Privacy Benchmark Study utilizes data from Cisco’s Annual Cybersecurity Benchma
Tags : 
    
Cisco EMEA
Published By: LiveAction     Published Date: Apr 26, 2019
In March of 2019, Sirkin Research was commissioned by LiveAction to identify the driving forces of network transformation and how the rapidly evolving network environment is impacting network professionals. It is well recognized that network transformations, such as SD-WAN, WiFi, and multi-cloud, edge computing among other trends, are creating a host of new challenges and opportunities for network operations. This research is based on responses from over 163 network and IT professionals in predominantly in enterprise organizations with at least $1 billion in revenue Attached is also the target account list.
Tags : 
    
LiveAction
Published By: MalwareBytes EMEA     Published Date: May 10, 2019
Enterprises, beware. Threat actors are continuing to eye businesses for high returns on investment in Q1 2019, breaching infrastructure, exfiltrating or holding data hostage, and abusing weak credentials for continued, targeted monitoring. From a steadfast increase of pervasive Trojans, such as Emotet, to a resurgence of ransomware lodged against corporate targets, cybercriminals are going after organizations with a vengeance. Yet every cloud has a silver lining, and for all the additional effort thrown at businesses, consumer threats are now on the decline. Ransomware against consumers has slowed down to a trickle and cryptomining, at a fever pitch against consumers this time last year, has all but died. Interestingly, this has resulted in an overall decline in the volume of malware detections from Q4 2018 to Q1 2019. While threat actors made themselves busy with challenging new victims, they ensnared targets in the old ways, using tried-and-true malspam and social engineering tactic
Tags : 
    
MalwareBytes EMEA
Published By: Workday     Published Date: Feb 18, 2019
Human capital management technology plays a key role in helping organizations navigate the rise of the social enterprise, providing the ability to manage the full worker lifecycle, from recruitment to retention, and delivering the analytics needed to drive key business decisions. Read about the four steps businesses should take now.
Tags : 
workday, workforce technology, digital strategy
    
Workday
Published By: Akamai Technologies     Published Date: May 06, 2019
Media organizations, gaming companies, and the entertainment industry are among the biggest targets of credential stuffing attacks. The people behind these attacks realize the value of an account, whether it’s to a streaming site, a game, or someone’s social media account. And, they’re willing to do whatever it takes to steal them. This report provides an overview of the recent credential stuffing attacks against these sectors and the risks these attacks pose. We’ll also explore some of the ways adversaries conduct these attacks.
Tags : 
    
Akamai Technologies
Published By: ServiceNow     Published Date: May 14, 2019
Most organizations face challenges when implementing a configuration management capability. In this book, you will learn basics of configuration management, how to build and maintain an effective configuration management capability for your organization, use cases, and key milestones on your journey.
Tags : 
    
ServiceNow
Published By: Larsen & Toubro Infotech(LTI)     Published Date: Apr 10, 2019
This LTI Point of View explores how ‘Digital’ is a key enabler for enterprise transformation, and the change in thinking and culture, is it’s real driver. To compete in today's tough marketplace, organizations need a strong digital core. It highlights the fact that an effective digital transformation is built on people, processes, hardware, and software. And true transformation occurs when these elements can be intelligently harnessed in real-time.
Tags : 
    
Larsen & Toubro Infotech(LTI)
Published By: PGi     Published Date: May 03, 2019
Frost & Sullivan research shows that unified communications (UC) is here to stay, with almost two-thirds of companies reporting that UC is deployed within their organization. GlobalMeet partnered with Frost & Sullivan to define unified communications as a service and outline how the cloud-based solution supports corporate goals. UCaaS delivers a wide variety of benefits to businesses, but not all UCaaS solutions are alike. Download the white paper to learn what key features and functionality to look for when evaluating potential UCaaS providers.
Tags : 
    
PGi
Published By: PGi     Published Date: May 03, 2019
As businesses give employees more power to work wherever and whenever they want, IT and business leaders are tasked with creating connected, collaborative work environments that are optimized for all devices. Rather than investing in point solutions that employees may or may not use, many organizations are investing in Unified Communications (UC) — more specifically, UC as a Service (UCaaS) or UC services delivered through the cloud.
Tags : 
    
PGi
Published By: Gigamon EMEA     Published Date: Apr 10, 2019
In spite of increasing cybersecurity budgets, organizations are dealing with a worsening skills shortage, obstacles to threat hunting, and ongoing cyberattacks. Download the “2019 Cyberthreat Defense Report” now to learn how IT security pros plan to address these challenges. You’ll learn how to deal with inevitable cyberattacks, eliminate network blind spots and increase the signal-to-noise ratio. Learn more about how IT security pros perceive cyberthreats and plan to defend against them. Download now!
Tags : 
    
Gigamon EMEA
Published By: Gigamon EMEA     Published Date: Apr 10, 2019
When selecting the right SOC for your business, taking into account current risks, threats and business objectives is absolutely critical. Get the Gartner report Selecting the Right SOC Model for Your Organization and decide for yourself which one makes the most sense for your company. This report looks at different factors for SecOps to consider for building, implementing, running, and sustaining the right SOC with 24/7 visibility into the IT environment.
Tags : 
    
Gigamon EMEA
Published By: Workday APAC     Published Date: May 08, 2019
Whether informing talent strategy or building more effective teams, data-driven insights about your workforce can set you up for success. This eBook from Human Capital Institute explores how people analytics can empower your entire organization. Read now.
Tags : 
    
Workday APAC
Published By: Workday APAC     Published Date: May 08, 2019
" How do some of the world’s biggest organizations transform their global HR operations? The five companies profiled in this eBook made their HR transformation journeys in very different ways, but they all arrived at the same destination—a single system that streamlines processes and boosts engagement across the entire organization. Read now to get their stories."
Tags : 
    
Workday APAC
Published By: HSBC     Published Date: May 07, 2019
Simply put, sustainability in business matters. From greater employee satisfaction to higher operating efficiencies, having a focus on sustainability is changing the way that organizations work, and succeed. The evidence is clear. Those organizations that put sustainability at the heart of their business outperform those who don’t by 16%.
Tags : 
    
HSBC
Published By: IBM APAC     Published Date: May 14, 2019
IBM PowerAI Enterprise helps to make deep learning easier and faster for organizations by bringing together some of the most popular open source frameworks for deep learning, with development and management tools in a single installable package. Designed to simplify end-toend deep learning, PowerAI Enterprise allows enterprises to spend less time on data preparation, implementation and integration, and more time training neural networks for results. IBM PowerAI Enterprise version 1.1.2 includes the most popular deep learning frameworks in one installation: - BVLC Caffe - IBMCaffe - TensorFlow - PyTorch - Keras (tensorflow-keras)
Tags : 
    
IBM APAC
Published By: IBM APAC     Published Date: May 14, 2019
Clients can realize the full potential of artificial intelligence (AI) and analytics with IBM’s deep industry expertise, technology solutions and capabilities and start to infuse intelligence into virtually every business decision and process. IBM’s AI & Analytics Services organization is helping enterprises get their data ready for AI and ultimately achieve stronger data-driven decisions; access deeper insights to provide improved customer care; and develop trust and confidence with AI-powered technologies focused on security, risk and compliance. Artificial intelligence (AI) is moving beyond the hype cycle, as more and more organizations seek to adopt AI-related technologies. These organizations are focusing on prioritizing functional areas and use cases, placing a stronger emphasis on topline growth, taking up a renewed interest in their data infrastructure and articulating greater unease about the skills of their knowledge workers. This report explores how they are approaching str
Tags : 
    
IBM APAC
Published By: IBM APAC     Published Date: May 14, 2019
Digital transformation (DX) continues to headline business initiatives as companies look to remain competitive in the rapidly changing IT landscape. Organizations are increasingly investing in and implementing next-generation applications and architectures such as software-defined IT and hybrid IT to drive higher levels of efficiency and agility. These modern technologies and architectures, however, also require organizations to evolve their underlying infrastructure to support new capabilities and demands. Recent strength in the server market, which continues to operate in a marketwide refresh cycle, illustrates the growing demand for new infrastructure. 1Q18 marked the server market's fifth consecutive quarter of both shipment and revenue growth and represented a fourth consecutive quarter of year-on-year ASP growth, as customers continue to replace aging server infrastructure with more powerful and efficient systems that leverage the latest platform developments from processor supp
Tags : 
    
IBM APAC
Published By: Zscaler     Published Date: May 15, 2019
Cloud computing is rapidly changing enterprise IT with applications like Salesforce and Office 365, which are improving productivity, reducing costs, and simplifying management. Now, organizations are discovering that those same advantages can be achieved by migrating security to the cloud. In fact, in its 2016 Magic Quadrant report on Secure Web Gateways, Gartner reported, “Cloud services have experienced a 35% five-year compound annual growth rate, while on-premises appliances have only grown by 6% during the same period.”
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: May 15, 2019
There’s no denying that Office 365 is a big deal. It’s a big part of the Microsoft Intelligent Cloud strategy. It’s big in terms of its user base. And it has a big impact on your network. Fully deployed, Office 365 will quickly become your greatest consumer of bandwidth and slayer of firewalls. Office 365 is unlike any other SaaS app and, even with careful planning, it’s fair to say that deployment doesn’t always go without a hitch. To help you get on the road to success, we’ve pulled together an overview of the most common pitfalls organizations make pre-deployment—and what you can do to avoid them.
Tags : 
    
Zscaler
Published By: Zscaler     Published Date: May 15, 2019
Enterprise security has undergone a complete transformation as a result of rapid and sweeping changes that are remaking the way public sector organizations do business. New technologies and trends are changing the very definition of an enterprise, how and where we work, and the tools we use to do our jobs. These trends include:
Tags : 
    
Zscaler
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
Data is the lifeblood of business. And in the era of digital business, the organizations that utilize data most effectively are also the most successful. Whether structured, unstructured or semi-structured, rapidly increasing data quantities must be brought into organizations, stored and put to work to enable business strategies. Data integration tools play a critical role in extracting data from a variety of sources and making it available for enterprise applications, business intelligence (BI), machine learning (ML) and other purposes. Many organization seek to enhance the value of data for line-of-business managers by enabling self-service access. This is increasingly important as large volumes of unstructured data from Internet-of-Things (IOT) devices are presenting organizations with opportunities for game-changing insights from big data analytics. A new survey of 369 IT professionals, from managers to directors and VPs of IT, by BizTechInsights on behalf of IBM reveals the challe
Tags : 
    
Group M_IBM Q2'19
Published By: Group M_IBM Q2'19     Published Date: Apr 03, 2019
As the information age matures, data has become the most powerful resource enterprises have at their disposal. Businesses have embraced digital transformation, often staking their reputations on insights extracted from collected data. While decision-makers hone in on hot topics like AI and the potential of data to drive businesses into the future, many underestimate the pitfalls of poor data governance. If business decision-makers can’t trust the data within their organization, how can stakeholders and customers know they are in good hands? Information that is not correctly distributed, or abandoned within an IT silo, can prove harmful to the integrity of business decisions.
Tags : 
    
Group M_IBM Q2'19
Published By: Black Duck Software     Published Date: May 18, 2010
In this webinar Black Duck Software (www.blackducksoftware.com), together with representatives of SAP, will review the benefits open source offers to development organizations, the management challenges it presents, and approaches for addressing those challenges.
Tags : 
black duck software, open source, platform, sap, multi-source, code, source
    
Black Duck Software
Published By: Black Duck Software     Published Date: Jul 16, 2010
This paper is for IT development executives looking to gain control of open source software as part of a multi-source development process. You can gain significant management control over open source software use in your development organization. Today, many IT executives, enterprise architects, and development managers in leading companies have gained management control over the externally-sourced software used by their application development groups. Download this free paper to discover how.
Tags : 
open source, development, architects, application development, software development
    
Black Duck Software
Start   Previous   1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search Research Library      

Add Research

Get your company's research in the hands of targeted business professionals.

“I am the Inspector Morse of IT journalism. I haven't a clue. D'oh” - Mike Magee